Searched refs:DROP (Results 1 – 22 of 22) sorted by relevance
1 -P INPUT DROP2 -P FORWARD DROP3 -P OUTPUT DROP
24 DROP DATABASE IF EXISTS `modeling`;33 DROP TABLE IF EXISTS `bugs`;55 DROP TABLE IF EXISTS `commits`;84 DROP TABLE IF EXISTS `cvsfiles`;110 DROP TABLE IF EXISTS `filetags`;133 DROP TABLE IF EXISTS `tags`;
24 iptables \-A INPUT \-p sctp \-\-dport 80 \-j DROP26 iptables \-A INPUT \-p sctp \-\-chunk\-types any DATA,INIT \-j DROP
3 .B DROP32 (*) Using icmp\-admin\-prohibited with kernels that do not support it will result in a plain DROP i…
33 iptables \-t raw \-A RPFILTER \-j DROP39 iptables \-t raw \-A RPFILTER \-m rpfilter \-\-invert \-j DROP
33 \-m mark ! \-\-mark 0xffff \-j DROP36 \-m mark ! \-\-mark 0xffff \-j DROP
14 iptables \-A AUDIT_DROP \-j DROP
5 to port 139 on your firewall and then DROP all future packets from them without72 iptables \-A FORWARD \-m recent \-\-name badguy \-\-rcheck \-\-seconds 60 \-j DROP74 iptables \-A FORWARD \-p tcp \-i eth0 \-\-dport 139 \-m recent \-\-name badguy \-\-set \-j DROP
3 .B DROP
11 then DROP (or REJECT).
28 DROP DATABASE chromeos_autotest_db;
4 with kernels that do not support it, will result in a plain DROP instead
54 iptables -P FORWARD DROP
81 iptables -P FORWARD DROP
146 #define DROP(n) (p->slen -= (n)) macro519 DROP(1); in p_bre()1002 DROP(finish-start); /* drop the operand */ in repeat()
300 274F..2752 ; 1.1 # [4] LOWER RIGHT DROP-SHADOWED WHITE SQUARE..UPPER RIGHT SHADOWED WHITE SQUA…
2671 # 274F..2752 valid # 1.1 LOWER RIGHT DROP-SHADOWED WHITE SQUARE..UPPER RIGHT …
8887 274F;LOWER RIGHT DROP-SHADOWED WHITE SQUARE;So;0;ON;;;;;N;;;;;8888 2750;UPPER RIGHT DROP-SHADOWED WHITE SQUARE;So;0;ON;;;;;N;;;;;
11360 cp;274F;na=LOWER RIGHT DROP-SHADOWED WHITE SQUARE11361 cp;2750;na=UPPER RIGHT DROP-SHADOWED WHITE SQUARE